Computer Security

Computer Security

Streaming Video - 2005
Rate this:
Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer security experts to explain measures that every company should take in order to protect its information assets. Fire walls, virus containment, encryption, authentication, access controls, and the development of a corporate culture of security are stressed.
Publisher: New York, N.Y. : Films Media Group, [2005], c1999
Characteristics: 1 streaming video file (30 min.) :,sd., col., digital file


From the critics

Community Activity


Add a Comment

There are no comments for this title yet.


Add Age Suitability

There are no ages for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number


Subject Headings


Find it at my library

To Top